Introduction to the behaviour change portfolio

What is the Behavior Change Portfolio? The Behavior Change Portfolio is a personalized collection of knowledge, reflections, and practical strategies that you develop throughout the module on security behavior change. Its purpose is to help you apply the concepts learned in lectures and readings to your own context, creating a “how-to” guide for implementing security behavior change in real-life situations.

Purpose and Integration with the Study Journal: The portfolio serves as a structured way to organize your learning and reflections. It complements your study journal, which you use to document your thoughts and notes during the module. While the study journal captures your immediate reflections, the portfolio synthesizes these insights into actionable strategies and examples that you can use in your cybersecurity practice.

Creating Your Portfolio: You have the flexibility to create your Behavior Change Portfolio in a format that suits you best. Here are a few options:

  1. Digital Directory: You might choose to organize your portfolio as a collection of files on your laptop. This allows you to easily store, categorize, and access your work.
  2. Online Visual Workspace: Alternatively, you can use tools like MIRO or Padlet to create an interactive and visually engaging portfolio. These platforms allow you to gather outputs from the module’s activities and exercises in a dynamic and organized manner.

Developing the Portfolio Content: The content of your portfolio is built up over the course of the module through participation in learning activities. These activities may include:

  • Discussions: Engaging in conversations with peers to deepen your understanding of security behavior change.
  • Exercises: Using tools like Padlet boards to explore interactive visualizations and case studies.
  • Reflection: Regularly reflecting on your learnings in your study journal and then integrating those reflections into your portfolio.

For example, in the “Behavior Change Case Studies” activity in Week 1, you will analyze real-world scenarios related to security behaviors. After reflecting on the solutions provided by industry experts in your study journal, you will add these reflections to your portfolio. You’ll also note how these insights could be applied in your day-to-day security practice.

Key Focus Areas in Your Portfolio: As you develop your portfolio, you will cover several key aspects of security behavior change:

  • Security Behaviors: Identifying common behaviors that security practitioners focus on.
  • Behavior Change Issues: Approaches for identifying issues in security behaviors.
  • Analysis Techniques: Methods for analyzing what needs to be changed in security practices.
  • Behavior Change Campaigns: Frameworks for designing and implementing a behavior change campaign.
  • Interventions: Commonly used interventions for changing security behaviors.
  • Conducive Environment: Strategies for creating an environment that supports security behavior change.
  • Measurement: Approaches for measuring the effectiveness of behavior change initiatives.

Peer Review and Final Presentation: In Week 5, you will participate in a peer review activity where you will provide feedback on excerpts from your peers’ portfolios and reflect on the feedback you receive. In Week 10, you will present a slide summarizing your most important learning outcome on a Padlet board, including an example of how you might apply this outcome in your cybersecurity practice.

Weekly Review and Refinement: Each week, you will have time to revisit the activities and notes you have compiled. This review process allows you to refine and enhance your portfolio, ensuring it is a comprehensive and practical guide for implementing security behavior change.

Book Reference

For further reading on the concept of behavior change and its application in cybersecurity, you may refer to:

  • “The Psychology of Security” by Ross Anderson. This book delves into the psychological principles behind security behaviors and offers insights into how behavior change can be effectively implemented in security contexts.
  • “Influence: The Psychology of Persuasion” by Robert Cialdini. This classic book provides a broader understanding of behavior change and influence, which can be applied to promoting security behaviors within an organization.

These references will help you deepen your understanding of the theories and principles that underlie the practical strategies you develop in your Behavior Change Portfolio

Leave a Comment

Your email address will not be published. Required fields are marked *